The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jiangtao Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jiangtao Li, Ninghui Li
    OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:301-317 [Conf]
  2. Jiangtao Li, Ninghui Li, William H. Winsborough
    Automated trust negotiation using cryptographic credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:46-57 [Conf]
  3. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li
    Efficient Correlated Action Selection. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:296-310 [Conf]
  4. Jiangtao Li, Ninghui Li
    A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:122-138 [Conf]
  5. Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
    Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  6. Mikhail J. Atallah, Jiangtao Li
    Secure Outsourcing of Sequence Comparisons. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:63-78 [Conf]
  7. Jiangtao Li, Ninghui Li
    Policy-hiding access control in open environment. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:29-38 [Conf]
  8. Mikhail J. Atallah, Jiangtao Li
    Enhanced Smart-card based License Management. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:111-119 [Conf]
  9. Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara
    Private collaborative forecasting and benchmarking. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:103-114 [Conf]
  10. Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
    Hidden access control policies with hidden credentials. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:27- [Conf]
  11. Mikhail J. Atallah, Jiangtao Li
    Secure outsourcing of sequence comparisons . [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:277-287 [Journal]
  12. Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
    Attribute-Based Access Control with Hidden Policies and Hidden Credentials. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:10, pp:1259-1270 [Journal]
  13. Jiangtao Li, Ninghui Li
    OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:340-352 [Journal]
  14. Jiangtao Li, Ninghui Li, Rui Xue
    Universal Accumulators with Efficient Nonmembership Proofs. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:253-269 [Conf]

  15. Dynamic Virtual Credit Card Numbers. [Citation Graph (, )][DBLP]


  16. Parallel Algorithm for Road Points Extraction from Massive LiDAR Data. [Citation Graph (, )][DBLP]


  17. Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. [Citation Graph (, )][DBLP]


  18. Model-based Age Estimation for Human Face Grouping. [Citation Graph (, )][DBLP]


  19. A New Direct Anonymous Attestation Scheme from Bilinear Maps. [Citation Graph (, )][DBLP]


  20. An Anonymous Attestation Scheme with Optional Traceability. [Citation Graph (, )][DBLP]


  21. A Pairing-Based DAA Scheme Further Reducing TPM Resources. [Citation Graph (, )][DBLP]


Search in 0.124secs, Finished in 0.125secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002